Browse all 3 CVE security advisories affecting rust-blockchain. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Rust-blockchain serves as a blockchain framework enabling decentralized applications and smart contract development. Historically, it has been susceptible to remote code execution vulnerabilities due to unsafe Rust code and memory management issues, along with cross-site scripting flaws in web interfaces. Privilege escalation risks have emerged from improper access controls in node implementations. While no major public security incidents have been widely reported, the three documented CVEs highlight ongoing concerns around memory safety and input validation. The framework's Rust foundation provides inherent memory safety advantages, but integration with other components and third-party libraries can introduce additional attack surfaces that require careful security review.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-39354 | evm has incorrect is_static parameter for custom stateful precompiles — evmCWE-670 | 5.9 | Medium | 2022-10-25 |
| CVE-2021-41153 | Specification non-compliance in JUMPI — evmCWE-670 | 8.7 | High | 2021-10-18 |
| CVE-2021-29511 | Memory over-allocation in evm crate — evmCWE-770 | 6.5 | Medium | 2021-05-12 |
This page lists every published CVE security advisory associated with rust-blockchain. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.